Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-17104

In FIPS mode, OpenSSL must not perform any cryptographic operations when rsa_keygen_pairwise_test fails

    • openssl-3.0.7-26.el9
    • None
    • Critical
    • ZStream
    • 2
    • rhel-sst-security-crypto
    • ssg_security
    • 24
    • 26
    • 0.5
    • QE ack
    • False
    • Hide

      None

      Show
      None
    • No
    • CentOS Stream
    • Crypto24Q1, Crypto23Q4
    • Approved Blocker
    • Release Note Not Required
    • x86_64
    • None

      What were you trying to do that didn't work?

      When rsa_keygen_pairwise_test in crypto/rsa/rsa_gen.c fails (e.g., if it is made to fail for testing purposes using gdb), according to ISO 19790 AS10.09 the module shall not perform "any" cryptographic operations or output data in error state.

      However, EVP_DigestUpdate and EVP_EncryptUpdate still fail. I filed https://github.com/openssl/openssl/pull/22506 upstream for this, but upstream disagrees. We have asked for clarification from CMVP. While we wait for clarification to settle this, we should patch this downstream to avoid blocking our submission.

      Please provide the package NVR for which bug is seen:

      openssl-3.0.7-18.el9_2

      How reproducible:

      See FIPS-182

      Expected results

      EVP_DigestUpdate() and EVP_EncryptUpdate() should not work

      Actual results

      EVP_DigestUpdate() and EVP_EncryptUpdate() work

              hkario@redhat.com Alicja Kario
              cllang@redhat.com Clemens Lang
              Clemens Lang Clemens Lang
              Alicja Kario Alicja Kario
              Votes:
              0 Vote for this issue
              Watchers:
              6 Start watching this issue

                Created:
                Updated:
                Resolved: